Analysis
-
max time kernel
159s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe
-
Size
2.4MB
-
MD5
f7ac6b1c529b12a30b4a6485ff82c027
-
SHA1
91f3ed6be9d497bb8ea4dc5833e7caec8419acb6
-
SHA256
8b1b622a62652cbae95a6376a72267a05c4cba6858b15cd52b5512bf99fc3435
-
SHA512
410b9b96fc63b66fa3afe5b200097f6b34ebc1b83a50f49ee8b6ced825b256940ca14fc3450197ebc09648beec51d10c681bd910f29c612cb4a1a645ddbb55a3
-
SSDEEP
49152:8MRbkzSYl+aFUUhf3LIE3VEaYMl8MW0sv16Dah3zqLqDejTpp0:8EoL33VEaYIIAo
Malware Config
Extracted
remcos
4.9.3 Light
RemoteHost
127.0.0.1:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-52SPIJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exepid process 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exepid process 636 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exepid process 636 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exedescription pid process target process PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe PID 1312 wrote to memory of 636 1312 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe 2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_f7ac6b1c529b12a30b4a6485ff82c027_magniber.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/636-11-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-18-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-19-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-10-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-17-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-5-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/636-7-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-16-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-20-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-15-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-8-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-12-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-13-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/636-14-0x0000000000670000-0x00000000006E5000-memory.dmpFilesize
468KB
-
memory/1312-1-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/1312-0-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/1312-4-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/1312-3-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/1312-2-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/1312-9-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB